Terrorist surveillance commonly includes which activity?

Prepare for the Hazardous Materials Test. Study with flashcards and multiple-choice questions, featuring hints and explanations. Ace your exam with confidence!

Multiple Choice

Terrorist surveillance commonly includes which activity?

Explanation:
Gaining intelligence about security measures and target vulnerabilities is what surveillance aims to do in this context. Terrorist surveillance focuses on observing and recording details about how a site is protected—the layout of entrances and exits, guard routines, camera coverage, patrol schedules, and access controls—so attackers can plan the best way to approach or exploit it. The described activities—videotaping potential targets, taking photographs, making sketches, and taking notes about security activities—directly translate real-world security features into usable information for planning. They provide concrete, actionable insight into where a target is most exposed and when. In contrast, everyday public activities like reading newspapers, attending public lectures, or listening to music don’t systematically collect security data and therefore don’t fit the pattern of surveillance aimed at assessing vulnerabilities.

Gaining intelligence about security measures and target vulnerabilities is what surveillance aims to do in this context. Terrorist surveillance focuses on observing and recording details about how a site is protected—the layout of entrances and exits, guard routines, camera coverage, patrol schedules, and access controls—so attackers can plan the best way to approach or exploit it. The described activities—videotaping potential targets, taking photographs, making sketches, and taking notes about security activities—directly translate real-world security features into usable information for planning. They provide concrete, actionable insight into where a target is most exposed and when. In contrast, everyday public activities like reading newspapers, attending public lectures, or listening to music don’t systematically collect security data and therefore don’t fit the pattern of surveillance aimed at assessing vulnerabilities.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy